ruchikagargdiwakar / ml_cyber_security_usecasesLinks
This project contains files for cyber security
☆36Updated 6 years ago
Alternatives and similar repositories for ml_cyber_security_usecases
Users that are interested in ml_cyber_security_usecases are comparing it to the libraries listed below
Sorting:
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆71Updated 6 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆213Updated last year
- NLP model and tech for cyber security tasks☆88Updated 2 years ago
- This is a paper list about Machine Learning for IDSes☆90Updated last year
- Extracting Attack Behavior from Threat Reports☆79Updated 2 years ago
- Towards Building an Intelligent Anti-Malware System: A Deep Learning Approach using Support Vector Machine for Malware Classification☆172Updated 2 years ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆17Updated 5 years ago
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆143Updated 6 years ago
- Cyber Attack Detection thanks to Machine Learning Algorithms☆105Updated 5 years ago
- Adversarial Malware Generator Using GANs☆55Updated last year
- Machine Learning Models to Detect and Classify Malicious URLs☆53Updated 2 years ago
- Free Malware Training Datasets for Machine Learning☆237Updated 4 years ago
- [IEEE S&P Workshop 2018] "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware" Abdullah Al-Dujaili, Alex Huang, Erik…☆109Updated last year
- Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately networ…☆105Updated 5 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆39Updated last year
- ☆34Updated 5 years ago
- Detection of network traffic anomalies using unsupervised machine learning☆27Updated 3 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆96Updated 2 years ago
- Realization of paper: "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN" 2017☆128Updated 7 years ago
- These scripts conduct TCPDUMP in harmony with CICFlowMeter to operation real-time traffic capturing and converting in csv file.☆52Updated 5 years ago
- ☆84Updated 2 years ago
- ☆25Updated 4 years ago
- Transfer Learning for Image-Based Malware Classification☆46Updated 3 years ago
- A machine learning based Intrusion Detection System☆153Updated 5 years ago
- ☆36Updated last year
- Detection of malicious domain names using machine learning and deep learning models☆16Updated 7 years ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆249Updated 3 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆43Updated last year
- A collection of resources for security data☆41Updated 7 years ago
- Scripts to deploy virtual testbed for log data analysis and anomaly detection.☆26Updated last year